Solved

W2000 and SID

Posted on 2004-08-15
2
257 Views
Last Modified: 2013-12-04
Background:
1) I do not run active directory, and
2) nobody other than me has an access to PC, and
3) I access the pc only locally

Question:
I detected other than administrators SID. How can I prevent other people to access and compromise my pc??

jbmd
0
Comment
Question by:jbmd
2 Comments
 
LVL 15

Accepted Solution

by:
Yan_west earned 25 total points
ID: 11806383
read this
http://windows.stanford.edu/docs/security2000.html

1- Remove access to everyone exept your user name to access to your computer locally,
2- open gpedit.msc and in your local windows security settings, be sure to remove access to everyone using this policy: "access this computer from network". Just enable this policy, and put no one in. .

from winnetmag:

"Log on locally. The Log on locally right lets users log on directly to a computer. This right and the Access this computer from network right are probably the two rights that new NT administrators most often overlook. I recommend that you remove this right from all groups except Administrators on servers. Doing so ensures that even if unauthorized users gain physical access to your server, they won't be able to log on unless they know an administrator-level username and password. Unauthorized users will see the message The local policy of this system does not permit you to log on interactively. Restricting this right won't prevent users from connecting to the system over the network, and restricting the Access this computer from network right won't prevent users from logging on locally to a computer."
0
 

Author Comment

by:jbmd
ID: 11807655
Additional "tiny" thing from the background: I do run webhosting from my pc.

1. I did "access this computer from network - to nobody"... and hopefully I will be able to open the pc after restart :-)

2. I will probably not do "Log on locally" restriction because I am running the pc from home.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

791 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question